Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Guide to firewalls and VPNS third edition 2611 Review questions 2. What are the

ID: 3684572 • Letter: G

Question

Guide to firewalls and VPNS third edition

2611 Review questions

2. What are the disadvantages of using leased lines to set up a private network?

4. Why would you choose a VPN that is built into a firewall rather than a VPN appliance or router?

6. What is the downside of using a proprietary VPN protocol?

8. What are the ways that participants in a VPN can be authenticated?

10. What are the benefits of setting up a VPN rather than using a leased line?

12. What would you consider purchasing a VPN appliance rather than installing less expensive VPN software?

14. Define and describe a mesh VPN configuration.

16. Define and describe a hub and spoke VPN configuration.

18. Which VPN protocol is most widely used today?

20. PPTP is an older VPN protocol that is mainly used with older client computers, but it has one advantage over the more recent L2TP. What is that advantage?

                                                                                               

Explanation / Answer

Q. Disadvantages of using leased lines to setup a private network?
A.   1. No backup
   2.Cost is high
   3. Delay in connection of network
Q. VPN firewall Advatages than VPN appliance or router?
A   Protection from internet security
   2. Access control of VPN traffic
   3. Centralized management
   5. Low latency
   6. Simlified routing
   7. Consolidated loging
   8. Scalable Architecture
Q. What is the downside of using a proprietary VPN protocol?
A. 1. VPNs require an indepth understanding of public network security issues and proper deployment of precautions.
2. The availability and performance of an organization's wide area VPN depends on factors largely outside of their control.
3. VPN technologies from different vendors may not work well together due to immature standards.
4. VPNs need to accomodate protocols other than IP and existing internal network technology.
Q. Authentication method to VPN?
A.   1. The password Authentication Protocol(PAP)
   2. The Shiva PAP(SPAP)
   3. Challenge Handshake Authentication Protocol(CHAP)
   4. The Extensible Authentication Protocol(EAP)
Q. HUB definition?
A.   A common connection point for devices in netwok. Hubs are commonly used to connect segments of a LAN.